Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,028,4588 Dynamic selection of security posture for devices in a network using risk scoring
In one embodiment, a method for assessing security posture for entities in a computing network is implemented on a computing device and includes: receiving...
US-1,028,4586 Data loss prevention techniques for applications with save to web functionality
Techniques presented herein describe data loss prevention (DLP) methods for saving a file to a destination over a network via an application, such as a...
US-1,028,4568 System and method for secure transmission of streamed data frames
Data acquired, for example by a mobile platform, such as a sequence of images observed by a mobile platform, is grouped. A signature is computed for each group...
US-1,028,4566 Proximity detection system
Various systems and methods for providing a walk away lock are provided herein. A plurality of data packets may be received at a compute device from a user...
US-1,028,4557 Secure data proxy for cloud computing environments
An apparatus in one embodiment comprises a plurality of host devices configured to support execution of applications on behalf of one or more tenants of cloud...
US-1,028,4556 Systems and methods for verifying authentication requests using internet protocol addresses
A computer-implemented method for verifying authentication requests using IP addresses may include (i) collecting, by a computing system, data on IP address...
US-1,028,4543 System and method for secure online authentication
Disclosed are systems and methods for secure online authentication. An exemplary method comprises: determining, via a processor of a computing device, a...
US-1,028,4542 Intelligent certificate discovery in physical and virtualized networks
Mechanisms are provided, in a communication device associated with a first computing device, for capturing security data exchanged between the first computing...
US-1,028,4535 Secure database
Methods, systems, and apparatus, including a system that includes a secure hardware unit; and a database system including one or more processors; and a...
US-1,028,4530 Secure computer peripheral devices
A method for improving security of peripheral devices is described. In one embodiment, the method includes sending, by a processor of a peripheral device, at...
US-1,028,4525 Cross-domain data-gate for secure transmission of data over publicly shared datalinks
A device for secure transmission of vehicle data over vehicle datalinks that may be shared with passenger devices and are connected to a publicly shared network...
US-1,028,4521 Automatic security list offload with exponential timeout
Disclosed are systems, methods, and computer-readable storage media for automatic security list offload with exponential timeout. A second layer of a firewall...
US-1,028,4481 Communication device, communication method, and storage medium
A communication device includes a reception unit configured to receive data transmitted from another communication device in response to a notification...
US-1,028,4373 Smart grid secure communications method and apparatus
Apparatus and methods performing secure communications in an energy delivery system. Energy delivery systems may include phasor measurement units (PMU), phasor...
US-1,028,4372 Method and system for secure management of computer applications
Processing information is disclosed including receiving an application retrieval request sent by a terminal, the application retrieval request including...
US-1,028,4369 Secure app-to-app communication
Secure application-to-application communication is disclosed. A shared encryption key may be used to encrypt data to be transferred from a first mobile...
US-1,028,4225 Systems and methods for data compression
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
US-1,028,2786 Techniques to visualize and gamify risk management services
Techniques for gamifying risk management services include associating a financial status of a user with a defensible position display element in a gameplay...
US-1,028,2730 Method for managing a transaction, corresponding server, computer program product and storage medium
A method for managing at least one transaction implemented by an electronic payment terminal having a magnetic stripe reader for reading a paycard of a user....
US-1,028,2724 Security system incorporating mobile device
In some embodiments, a first server computer may be provided. The first server computer may comprise a processor and a computer readable medium coupled to the...
US-1,028,2719 Secure and trusted device-based billing and charging process using privilege for network proxy authentication...
A user equipment with a primary identifier and a secondary identifier. The user equipment comprises a witness application stored in the memory, that when...
US-1,028,2682 Systems and methods for assignment of equipment to an officer
A system for tracking, assigning, and issuing equipment to security agency personnel (e.g., officers, administration, command, armorer). An armorer is assigned...
US-1,028,2650 System and apparatus for encrypted data collection using RFID cards
A secure smart card is described. The smart card can include a processor, a memory and a transceiver. The smart card can communicate with various terminals and...
US-1,028,2565 Computer security environment
A computer security environment that delays physical access to a computer system, detects intrusion attempts upon that computer system, using one or more...
US-1,028,2563 Video-based privacy supporting system
Computer display privacy and security for computer systems. In one aspect, the invention provides a computer-controlled system for regulating the interaction...
US-1,028,2562 Secure digital data collection
Systems and methods for generating certified images and incident reports are disclosed. An image capture device can be used to capture an image and integrate...
US-1,028,2557 Systems and methods for protecting sensitive data against data loss
The disclosed computer-implemented method for protecting sensitive data against data loss may include (1) identifying a resource comprising sensitive data, (2)...
US-1,028,2556 Secure cloud-based storage of data shared across file system objects and clients
Techniques to provide secure cloud-based storage of data shared across file system objects and clients are disclosed. In various embodiments, a primary...
US-1,028,2552 Device blanking
A method and apparatus is disclosed for protecting electronic devices from security breaches (e.g., in the form of DPA attacks) by managing input/output (I/O)...
US-1,028,2548 Method for detecting malware within network content
Systems and methods for detecting malicious content are provided. In an exemplary embodiment, a method for detecting malicious content is described that detects...
US-1,028,2535 Method and system to validate identity without putting privacy at risk
A method and system to verify identity while protecting private data. To locally verify identity without requiring communication with an external database or...
US-1,028,2313 Universal serial bus smart hub
A USB smart hub may provide enhanced battery charging, data storage security, vendor matching, device authentication, data capture/debug, and role switching....
US-1,028,2117 Device controller and method of enforcing time based sector level security
A device controller interfaced between an electronic processing device and a sector-based data storage device, includes a processor connected to a clock, and a...
US-1,028,1672 Fiber optic patching system
A fiber optic patching system may include one or more cassettes which may be removably coupled a chassis. A cassette may include a channel with a lock tab...
US-1,028,0632 Load distribution structures for raised floor data center
Load distribution structures are provided for a raised floor tile(s) of a raised floor data center. The load distribution structure, which resides adjacent to...
US-1,028,0631 Load distribution structures for raised floor data center
Load distribution structures are provided for a raised floor tile(s) of a raised floor data center. The load distribution structure, which resides adjacent to...
US-1,028,0630 Load distribution structures for raised floor data center
Load distribution structures are provided for a raised floor tile(s) of a raised floor data center. The load distribution structure, which resides adjacent to...
US-1,027,8603 System and method for secure physiological data acquisition and storage
A system and method for secure physiological data acquisition and storage. An identifier of a physiological monitoring patch is obtained by a programming wand,...
US-1,027,8061 Dynamic utilization of services by a temporary device
A system for dynamically providing or utilizing services and applications on a temporary or new device is provided. A user can send a message with a secure code...
US-1,027,7947 System and method for utilizing a secured service provider memory
A system and method for utilizing a secured service provider memory are disclosed. An electronic device is associated with a subscriber and is in communication...
US-1,027,7935 Method and apparatus for hardware-enforced, always-on insertion of a watermark in a video processing path
A method, apparatus, article of manufacture, and a memory structure for inserting a watermark in a media program is described. In an exemplary embodiment, the...
US-1,027,7630 MobileNet
A system, method, and apparatus for establishing communications with a secure network using a non-secure mobile device operating in a non-secure network are...
US-1,027,7616 Secure digital traffic analysis
A network monitoring "sensor" is built on initial startup by checking the integrity of the bootstrap system and, if it passes, downloading information from...
US-1,027,7609 Communication protocols in integrated systems
A system and methods comprise a touchscreen at a premises. The touchscreen includes a processor coupled to a security system at the premises. User interfaces...
US-1,027,7587 Instantiation of multiple electronic subscriber identity module (eSIM) instances
Methods are provided for instantiating multiple electronic subscriber identity modules (eSIMs) to an electronic universal integrated circuit card (eUICC) using...
US-1,027,7583 System, method and computer program product for authenticating and authorizing an external entity
In accordance with embodiments, there are provided mechanisms and methods for authenticating and authorizing an external entity. These mechanisms and methods...
US-1,027,7578 Securing network activity managed by operating systems
Methods and systems are disclosed for providing approaches to receiving, by an enterprise framework device from an application executing on a computing device,...
US-1,027,7568 Secure patient record transmission and removal
The technology relates to securely providing patient data to caretakers. Verification information from one or more patients may be received by one or more...
US-1,027,7561 Database management system shared ledger support
A business application may provide a secure ledger update while maintaining anonymity and security from unauthorized third parties. One example may include...
US-1,027,7437 Telematics 5G and multimode 4G and 3G mobile modulation format selectable (MFS) communications
Telematics, telemetry, including medical telemetry and telematics, one or multiple Remote Control (RC) or Universal Remote Control (URC) devices, Multimode 5G,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.